1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
8

You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o

n a link to reset your password to the company’s website. You should proceed with caution because the email may be a(n) _______ attempt. A. spam B. phishing C. malware D. legitimate
Computers and Technology
2 answers:
tensa zangetsu [6.8K]3 years ago
7 0

the correct answer is : phishing

cestrela7 [59]3 years ago
3 0
Here are my definitions of each option:

Spam = Unwanted mail, advertisements, etc

Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft

Malware = Usually a malicious piece of code that can be used to slow down your computer or to get a hold of your computer for some other malicious reason

Legitimate = Means that the sender is valid, you know who its coming from, and you know that you won't get attacked by the email

So based on this, I would say that the answer is B. Phishing


You might be interested in
When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
Romashka-Z-Leto [24]

A shell function will do nothing unless it is explicitly called by other code, typically in a shell script. A shell script is a running executable process, which can call other shell scripts and/or functions. Typical operations performed by shell scripts include file manipulation, program execution, and printing text.

3 0
3 years ago
You began a small mobile app company. To help market your apps, you create a social media site. The site allows users to join co
dem82 [27]

Answer: shared

Explanation:

Shared media simply refers to the contents that a particular brand posts to social media platforms.

In such cases, the site gives room for the users to join conversations regarding the post being shared by the brand. It is typically cost effective and used by several organizations.

3 0
3 years ago
I would A lot of knowledge and education for computers and <br> Technology
borishaifa [10]

Answer:

Pay attention in your class.

Explanation:

If you paid attention in your class, you would have at least a basic understanding of the material.

7 0
3 years ago
Read 2 more answers
As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
miv72 [106K]

Answer:

A cyber security agent

Explanation:

That will mean protecting organizations from being hacked by other ethical hackers

4 0
3 years ago
What is the difference between a switch and a hub?
marta [7]

Explanation:

A hub is used to send the message from one port to other ports.It does not know the specific address of the destination where the message needs to send.it works on Physical layer of the OSI model(layer 1).

A switch can handle data and it knows the specific address of the destination.A switch works on the data link Layer of the OSI model(layer 2).

8 0
3 years ago
Other questions:
  • 1. What is the difference between a learner’s license and an operator’s license?
    10·1 answer
  • Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the pro
    11·1 answer
  • Karen has opened a new business and is using Google Display Ads to build awareness of her new products. How does Google Display
    6·1 answer
  • To remove text from a specific location and keep it to use again, you should select ___
    6·1 answer
  • Indicate the time efficiency classes of the three main operations (i.e., FindMax, DeleteMax, and Insert) of the priority queue i
    11·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • A browser is used for creating Web pages. true or false?
    5·2 answers
  • The correct ordering of the seven layers from "top" to "bottom" is
    11·1 answer
  • which of the following statements about matter is true a.matter is anything that occupies space and possesses mass b.matter can
    5·2 answers
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!